Magazine: Summer 2025 | Volume 31, No. 4
Download
- Digital Edition web-based magazine available for subscribers – sign in
- PDF via ACM’s Digital Library
COLUMN: INIT
The Future of Cybersecurity: Emerging Challenges and Innovative Strategies
By Moshe Satt
COLUMN: User Account
Challenging the Growth Narrative in and Through HCI
By Vishal Sharma, Asra Sakeen Wani, Raphaël Marée, Christoph Becker, Douglas Schuler, Aparajita Marathe, Neha Kumar, Han Qiao, Rikke Hagensby Jensen, Anupriya Tuli
SECTION: Features
AI-Powered Phishing: The Current Landscape and Future Projections
AI-powered phishing attacks have rapidly evolved, utilizing advanced personalization, multi-channel deception, and deepfake technology to surpass human-crafted scams in both scale and effectiveness. This unprecedented chapter of cybercrime has created never-before-seen challenges for security professionals. Individuals and organizations will need to adopt AI-driven security measures to keep ahead of these AI-driven threats.
By Daniel Aldam
Scams at Scale: Unmasking Crypto Fraud and Social Engineering on the Modern Web
From legitimate-looking cryptocurrency investment portals to fake celebrity giveaways, scammers are building sophisticated campaigns that exploit users' trust across the web to deprive them of their life savings. In this article, we unpack how some of these campaigns operate at scale and how researchers can systematically detect, track, and stop them.
By Abisheka Pitumpe, Muhammad Muzammil, Xigao Li, Nick Nikiforakis, Amir Rahmati
Cyber-Physical Security in Healthcare: Vulnerabilities and Emerging Solutions
The integration of connected medical devices has transformed patient care but has introduced significant cybersecurity vulnerabilities. This article examines key risks in Internet of Medical Things (IoMT) systems and explores emerging solutions for safeguarding patient safety in an increasingly connected healthcare environment.
By Aakar Mutha
Deepfake Technology and the Rise of Misinformation
As the advent of deepfake technology blurs the line between fact and fiction, a sophisticated new threat has been gaining ground in the digital age. How is AI-generated media being weaponized to spread disinformation and influence public perception? And can we still trust what we see online?
By Vamsi Koneti
OPEN ACCESS
Can You Trust What AI Hears (and Says)?
Audio-first language models are becoming the next frontier for AI vulnerabilities.
By Jaechul Roh
DMAP: A Blockchain-Enhanced Deepfake Verification Framework to Safeguard Individual Privacy and National Security
While media can be faked, decentralized authentication can restore trust.
By Abdul Waheed, Nicholas S. Reese
OPEN ACCESS
A City That Thinks---But Doesn't Overthink
Smart cities expand connectivity---but also vulnerability. Equitable governance and built-in cybersecurity are essential to protecting data, infrastructure, and our civil liberties.
By Hummd Damita Alikhan
DEPARTMENT: Hello World
Keeping Your Digital Life Safe: Building a Simple Password Manager
By Pavithra Sripathanallur Murali